View gist:a3617de4218a183f58d7e3e6f3e3bf00
# This file contains common pin mappings for the 2017 Creality
# CR-10. To use this config, the firmware should be compiled for the
# AVR atmega1284p.
# Note, a number of Melzi boards are shipped without a bootloader. In
# that case, an external programmer will be needed to flash a
# bootloader to the board (for example, see
# http://www.instructables.com/id/Flashing-a-Bootloader-to-the-CR-10/
# ). Once that is done, one should be able to use the standard "make
# flash" command to flash Klipper.
View gist:7bb2dc4e0bc3316b2b0b111d0c6210ca
# This file contains common pin mappings for the 2017 Creality
# CR-10. To use this config, the firmware should be compiled for the
# AVR atmega1284p.
# Note, a number of Melzi boards are shipped without a bootloader. In
# that case, an external programmer will be needed to flash a
# bootloader to the board (for example, see
# http://www.instructables.com/id/Flashing-a-Bootloader-to-the-CR-10/
# ). Once that is done, one should be able to use the standard "make
# flash" command to flash Klipper.
View misc.ino
long timeDiff(unsigned long prev, unsigned long next)
{
long signed_diff = 0;
// To cast a value to a signed long, the difference may not exceed LONG_MAX
const unsigned long half_max_unsigned_long = 2147483647u; // = LONG_MAX
if (next >= prev) {
const unsigned long diff = next - prev;
if (diff <= half_max_unsigned_long) {
// 0........prev******next......................ULONG_MAX
View gist:1aed765a7a943c1e5ac6758eceb119ce
/var/log/secure
Dec 8 10:44:16 svr-dc12 pluto[27238]: "testtunnel" #3: STATE_QUICK_I2: sent QI2, IPsec SA established tunnel mode {ESP=>0x6f0231d8 <0x7c3e0a2c xfrm=AES_CBC_128-HMAC_
SHA1_96 NATOA=none NATD=none DPD=active}
Dec 8 10:44:23 svr-dc12 pluto[27238]: assign_holdpass() delete_bare_shunt() failed
Dec 8 10:44:23 svr-dc12 pluto[27238]: initiate_ondemand_body() failed to install negotiation_shunt,
Dec 8 10:44:23 svr-dc12 pluto[27238]: initiate on demand from 192.168.250.1:53877 to 192.168.11.19:161 proto=17 because: acquire
Dec 8 10:44:23 svr-dc12 pluto[27238]: assign_holdpass() delete_bare_shunt() failed
Dec 8 10:44:23 svr-dc12 pluto[27238]: initiate_ondemand_body() failed to install negotiation_shunt,
Dec 8 10:44:23 svr-dc12 pluto[27238]: initiate on demand from 192.168.250.1:53877 to 192.168.11.13:161 proto=17 because: acquire
Dec 8 10:44:23 svr-dc12 pluto[27238]: assign_holdpass() delete_bare_shunt() failed
View gist:c379f0450692c5bfeee4789ec0f9b510
Last login: Tue Oct 3 05:00:10 2017
[root@backup ~]# zfs list
The ZFS modules are not loaded.
Try running '/sbin/modprobe zfs' as root to load them.
[root@backup ~]# yum remove zfs zfs-kmod spl spl-kmod libzfs2 libnvpair1 libuutil1 libzpool2 zfs-release
Loaded plugins: fastestmirror
Resolving Dependencies
--> Running transaction check
---> Package kmod-spl.x86_64 0:0.7.2-1.el7_3 will be erased
---> Package kmod-zfs.x86_64 0:0.7.2-1.el7_3 will be erased
View gist:12d7b43bae7a57a4f36ae9c19d175016
Sep 7 12:09:38 3cx pluto[3819]: "loc12" #1: initiating v2 parent SA
Sep 7 12:09:38 3cx pluto[3819]: "loc12" #1: loc12 IKE proposals for initial initiator (selecting KE): 1:IKE:ENCR=AES_GCM_C_256;PRF=HMAC_SHA2_512,HMAC_SHA2_256,HMAC_SHA1;INTEG=NONE;DH=MODP2048,MODP3072,MODP4096,MODP8192 2:IKE:ENCR=AES_GCM_C_128;PRF=HMAC_SHA2_512,HMAC_SHA2_256,HMAC_SHA1;INTEG=NONE;DH=MODP2048,MODP3072,MODP4096,MODP8192 3:IKE:ENCR=AES_CBC_256;PRF=HMAC_SHA2_512,HMAC_SHA2_256,HMAC_SHA1;INTEG=HMAC_SHA2_512_256,HMAC_SHA2_256_128,HMAC_SHA1_96;DH=MODP2048,MODP3072,MODP1536 4:IKE:ENCR=AES_CBC_128;PRF=HMAC_SHA2_512,HMAC_SHA2_256,HMAC_SHA1;INTEG=HMAC_SHA2_512_256,HMAC_SHA2_256_128,HMAC_SHA1_96;DH=MODP2048,MODP3072,MODP1536 (default)
Sep 7 12:09:38 3cx pluto[3819]: "loc12" #1: STATE_PARENT_I1: sent v2I1, expected v2R1
Sep 7 12:09:41 3cx pluto[3819]: packet from 94.168.0.90:500: initial parent SA message received on 185.112.64.25:500 but no suitable connection found with IKEv2 policy
Sep 7 12:09:41 3cx pluto[3819]: packet from 94.168.
View gist:77f2aa5fe49b8a80904cb3e3e9b8fbb7
[Syn-3] root@darkstar.example.net ~# cat /etc/ipsec.d/ipsec.pub
: RSA {
# RSA 3376 bits darkstar Thu Jan 12 16:42:41 2017
# for signatures only, UNSAFE FOR ENCRYPTION
#ckaid=657cfd81eaa05d3e7b02026d9c7d30db2c639f0b
#pubkey=0sAQGgZ6ux7PcGscyY9CPl+V15h2Bo7UBe2urarB/D0r+AVsrDS1eHVQiLfKz+92f2d770/yiWC1fnClCW2qItz02az0+rtmsa90AT9rhb2W00MUOQiQ14bldO/YbiwT/22go2YqylzbsCv4BsxsPDJUArcoJavxStF5YiWVStwlDO0kDnwCh3ZmcmQJBcCAWwknQ+q3DI9HWUIOUX4D8fKBKD09gNeb7EJBswWPg30HvtiP01CNI4QShrgvzhJf9blT4udhKWajSuJxt+WlxE1apL7ERS9lGeNV5k04z18p6ghGPY/MN8LG5khNy/91HiKkar2oQB7xoBKbXAQwZeZuPnRRc96bAjvqUMmynlL2hWYEpN06YPjR6L40+JZHzQBaIbz0uOoP/IbxXQvY+YnI8Ld0/yfd9QX0myT+bAGpG7sCSMDvREWLGxj9UsS/kR+deCNDHwG5HDwP+X5OwU2tD1uzNHNaRhNWPHItd3GMZGRl+6qcpEniHlw00i6zVvzyYdwwIFVf0ls4sR5Z9jTPzFWq+LUTR2DFn6v6Hn/oLFRoIJLrHaNQ==
Modulus: 0xa067abb1ecf706b1cc98f423e5f95d79876068ed405edaeadaac1fc3d2bf8056cac34b578755088b7cacfef767f677bef4ff28960b57e70a5096daa22dcf4d9acf4fabb66b1af74013f6b85bd96d34314390890d786e
View gist:753e56698c60570e3907e6488138c181
['133366', '252139', '151439', '41478', '\n']
['133339', '252100', '151449', '41461', '\n']
['133300', '252082', '151391', '41472', '\n']
['133251', '252108', '151396', '41530', '\n']
['133301', '252127', '151396', '41471', '\n']
['133313', '252156', '151353', '41473', '\n']
['133227', '252148', '151330', '41523', '\n']
['133161', '252077', '151385', '41500', '\n']
['133235', '252123', '151378', '41484', '\n']
['133287', '252085', '151317', '41473', '\n']
View extlinux zfs problem
[Syn-3] root@darkstar.example.net ~/syslinux-6.04-pre1# sfdisk --dump /dev/hda
label: dos
label-id: 0x3658e4b9
device: /dev/hda
unit: sectors
/dev/hda1 : start= 2048, size= 262144, type=fd, bootable
/dev/hda2 : start= 264192, size= 4294701056, type=fd
[Syn-3] root@darkstar.example.net ~/syslinux-6.04-pre1# mount
devtmpfs on /dev type devtmpfs (rw,relatime,size=2066292k,nr_inodes=212937,mode=755)
View gist:1151e50dc7517ea0e24f
[root@volg ~]# python3.5
Python 3.5.1 (default, Jan 28 2016, 19:23:45)
[GCC 4.9.3] on sunos5
Type "help", "copyright", "credits" or "license" for more information.
>>> import wand.image
Traceback (most recent call last):
File "/opt/local/lib/python3.5/site-packages/wand/api.py", line 179, in <module>
libraries = load_library()
File "/opt/local/lib/python3.5/site-packages/wand/api.py", line 134, in load_library
raise IOError('cannot find library; tried paths: ' + repr(tried_paths))